Anatomy of a Cyber Attack (Accounting & Auditing Conference)

CPE

CPE Credits
1-A&A

Details

 Pricing

PICPA Member: $29 | Nonmember: $39


 More Information

Course No.
ON-DEMAND
Level
Update
Prerequisites
None
Note

You will have up to 90 days after the date of purchase to complete the course and take the exam.

Description

If you attended the Accounting Auditing Conference on December 7, 2016, this course would be considered a duplicate and cannot be used towards your CPE requirement.

Earn CPE anywhere!

Listen to Ken Pyle cover the following:

  • Trends in data security
  • Insurance risk
  • Cybersecurity risk in internal audits


Speaker(s)

Ken Pyle
CISSP, HCISPP, ECSAv8, CEHv8, OSCP, OSWP, CCNA, VCP, EnCE, ACE, Sec+
Partner
DFDR Consulting LLC

Ken Pyle is a partner and Chief Information Security Officer of DFDR Consulting. He has specialized in Information Security, Computer Forensics, Enterprise Virtualization and Network Engineering. Ken has an extensive background in Network Penetration and Remediation, Compliance and Secure Design. Prior to joining DFDR, he served as a Security and Network Engineer for several Information Technology companies and as the IT Director/Security Engineer of a large accounting firm. Ken has consulted with financial institutions, banks, government defense contractors and other highly secure facilities on issues of Information Security, Computer Forensics and Secure Network Design.

Ken has lectured on Information Security and has published several whitepapers on subjects including public information gathering via Social Networking and Social Engineering. Ken was a featured speaker at the 2014, 2013 & 012 Wolters Kluwer CCH User Conference lecturing on "Information Security and Defending the Enterprise" and "Anatomy of a Cyber Attack". Ken is a regular lecturer and presenter on Information Security and has presented for several accounting associations and professional organizations including Prime Global, RBMA and AGN. Ken is also a subject matter expert for Information Security, appearing in industry publications such as Accounting Today and the New Jersey Law Journal. He was also recognized as a "40 under 40" by South Jersey Business People in 2015.

He holds numerous security and technology certifications from companies such as Guidance Software, EC-Council, Cisco, VMware, CompTIA and AccessData. Ken has published several software vulnerabilities and exploits, and is an active researcher. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design.

March 2017